EP1656744A1 - Verfahren und vorrichtung zum verschlüsseln eines digitalen datenstroms in einem übertragungssystem - Google Patents

Verfahren und vorrichtung zum verschlüsseln eines digitalen datenstroms in einem übertragungssystem

Info

Publication number
EP1656744A1
EP1656744A1 EP04744711A EP04744711A EP1656744A1 EP 1656744 A1 EP1656744 A1 EP 1656744A1 EP 04744711 A EP04744711 A EP 04744711A EP 04744711 A EP04744711 A EP 04744711A EP 1656744 A1 EP1656744 A1 EP 1656744A1
Authority
EP
European Patent Office
Prior art keywords
data stream
digital data
interval
spreading code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP04744711A
Other languages
English (en)
French (fr)
Inventor
Francesc Dalmases
Joachim Kahlert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Philips Intellectual Property and Standards GmbH
Koninklijke Philips NV
Original Assignee
Philips Intellectual Property and Standards GmbH
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Intellectual Property and Standards GmbH, Koninklijke Philips Electronics NV filed Critical Philips Intellectual Property and Standards GmbH
Priority to EP04744711A priority Critical patent/EP1656744A1/de
Publication of EP1656744A1 publication Critical patent/EP1656744A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0074Code shifting or hopping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/10Code generation
    • H04J13/12Generation of orthogonal codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/16Code allocation
    • H04J13/18Allocation of orthogonal codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Definitions

  • the invention relates to a method for encrypting a digital data stream in a transmission system which has a transmitter for modulating a digital data stream and for transmitting the modulated digital data stream, as well as a receiver for receiving the modulated digital data stream and for recovering the digital data stream.
  • a transmission system that carries out the modulation or encryption on the basis of an orthogonal code.
  • the invention also relates to such a transmission system.
  • the invention relates in particular to an encryption method that uses an orthogonal code for the modulation.
  • the invention furthe ⁇ nore relates to a transmission system that can be used for cordless as well as line-based networks. It can be used for single-carrier as well as multi- carrier modulation.
  • cordless transmission systems it can be used for systems with a single antenna as well as for those with several antennae.
  • CDMA Code Division Multiple Access
  • the CDMA method carries out a division of the spectrum into a broad frequency band, referred to in the following as
  • the digital data stream comprises a successive sequence of symbols.
  • Each symbol of the digital data stream d® of the k th connection (link) is multiplied during the entire connection by the same spreading frequency or by the same spreading code c w .
  • the vector stated in the equation (2) describes a spreading code c ⁇ that is composed of positive and negative rectangular pulses as well as zero values. Its period T c is a constant of P bits and expresses the duration of the validity of one of the elements en to Cp- ⁇ _. If— as in the CDMA method - an orthogonal spreading code is used, the spread signal s® can be received by the k th subscriber as a reception signal r (k) ' and the digital data stream can be recovered through correlation of the reception signal r ' with the same spreading code c ⁇ that was also used in the mixing.
  • Establishment of the spreading code takes place for example after connection set-up. Since the CDMA method is used in networks in which different connections can be set up simultaneously, numerous different spreading codes exist. Here, each connection is assigned a different spreading code, so that the transmitted data can be decoded only by the authorized recipient. The number of spreading codes used in the CDMA method is limited; the spreading codes themselves can be found out. During the entire data transmission from one network subscriber to another, according to equation (1) only the one spreading code established by the transmitting subscriber, is used. This leads to the situation that data streams that have been intercepted and stored by unauthorized receivers can be decoded through correlation of the received spectrum with various orthogonal codes. Such transmission systems are thus not secure against eavesdropping.
  • the patent application GB 2 331 207 A discloses a communication system that uses orthogonal codes in the CDMA method.
  • it relates to an orthogonal multiple access system that divides the channels according to a hopping pattern of the orthogonal code.
  • the transmitter has a first generator for the orthogonal hopping code, which has an orthogonal code generator for producing the orthogonal code in accordance with a hopping pattern, and a hopping controller that is connected to the orthogonal code generator for producing the hopping pattern.
  • the first generator for the hopping orthogonal code includes a memory for storing the orthogonal code for the output in accordance with the hopping pattern, and a hopping controller for producing the hopping pattern and for outputting the hopping pattern to the memory.
  • different orthogonal codes have different hopping periods T n0p -
  • T hop an encryption function is realized on the transmitter side, or a decoding function is realized on the receiver side: however, this is aimed only at the overall communication system and not at the individual channels, each of which is assigned a spreading code that is to be used constantly.
  • the orthogonal codes are produced by a Hopping Code Generator (HCG) in accordance with a hopping pattern that can be selected by the hopping controller.
  • HCG Hopping Code Generator
  • the hopping time of an individual orthogonal code can be shorter than the duration of a data unit, identical to the duration of a data unit, or an n-multiple of the length of a data unit, where n is a whole number.
  • the international patent application WO 02/056 17 Al discloses a method for operating a CDMA communication system, which in a coverage area of a base station assigns one spreading code out of a number of spreading codes to individual subscribers of a number of subscriber stations, and which then during transmission periodically hops between the spreading codes within the cell, and in fact within the quantity of spreading codes. So that at any given time, no two subscriber stations are working with the same spreading code, all subscribers are registered in a table containing the PN codes, with the subscribers being offset relative to one another.
  • the subscribers are moved to the same extent, so that they hop from one code to another whilst retaining their offset.
  • the step of periodic hopping preferably changes from the currently-used spreading code to the next spreading code at a symbol rate or a multiple of the symbol rate.
  • the system can be one with a fixed data rate or with a variable data rate. What is decisive here is that all subscribers registered in the table are moved to the same extent, so that their offset is maintained and it is thus ensured that each subscriber works with a different spreading code. In order to ensure this, the allocation of the spreading codes and of the pattern for the hopping takes place in a centralized and co-ordinated manner.
  • the pattern for the hopping is established and is known to every subscriber, so that it is ensured that the distance between the subscribers in the table is maintained. By hopping from the currently-used spreading code to another spreading code, any interference that may be present between two subscribers is reduced. It is an object of the present invention to define a method for encrypting a digital data stream in a transmission system that uses orthogonal codes for the modulation, which increases the security of the data stream against eavesdropping. It is furthermore an object of the invention to define a method for decoding a digital data stream that has been transmitted encrypted. It is furthermore the task of the invention to define a device for carrying out such a method.
  • Increasing the degree of encryption by varying the encryption, as described in claim 1, during an existing connection makes it more difficult for an unauthorized third party to find out the content of the data stream on the basis of intercepted data by trying out all known spreading codes, since each individual spreading code, even if it is actually known, is applied only for a short time, and then in a quasi-random sequence another spreading code from the established quantity is applied and/or the length of the hop interval from one spreading code to the next is varied.
  • the assigned sequence for the application of the different spreading codes is valid only for a single k th connection, and is known only to the transmitting and the receiving device. This sequence is not produced centrally and is not assigned to several connections, so that the assigned sequence for a particular connection is not known to others.
  • the sequence is established by the transmitting device and is for example produced by a random generator or taken from a table stored in a memory.
  • the sequence for the use of the different spreading codes is preferably of a random nature here.
  • the hop intervals assigned to a k th connection indicates the validity for a spreading code, and can be defined as a period, i.e. a time-related period of validity, or as a number of data packets.
  • the hop interval is established decentrally by the transmitting device, and is notified to the receiving device.
  • the sequence for the use of the content of a set of spreading codes can bedefmed by a permutation function which is constructed as a vector and which states the respective position of the spreading code that is to be used at that moment. In the first place of the vector is the position of the first spreading code that is to be used, in the second place the position of the second spreading code to be used, etc.
  • the permutation function includes M elements.
  • a first permutation procedure is executed, which contains a loop with the following steps: setting of an interval to " 1 " ; waiting for the end of a predefined hop interval; increasing the interval by the value 1 ; - carrying out a comparison to see whether the current value of the interval is greater than the total number of elements of a permutation function which states the positions of the spreading code of a set of spreading codes that is to be used for encrypting the digital data stream, wherein alternatively the following takes place: - if the comparison has a positive result: resetting of the interval to "1"; - if the comparison has a negative result: equating the current spreading code with the spreading code that stands at the position stipulated by the permutation function.
  • This method describes the definition or allocation of the spreading code that is to be used respectively at a given time.
  • the task of the invention is fulfilled in that the device has a first code generator that produces the respectively current spreading code.
  • the production of the respectively current spreading code can take place contemporaneously during encryption, or can be concluded before encryption, wherein then the spreading codes to be used during encryption are for example stored in a table in a ROM or other memory.
  • the task is fulfilled through the execution of a second permutation procedure that contains a loop with the following steps: - setting an interval to "1"; waiting for the end of a predefined hop interval; increasing the interval by the value 1; carrying out a comparison to see whether the current value of the interval is greater than the total number of elements of a permutation function which states the positions of the spreading code of a set of spreading codes that is to be used for decoding the encrypted digital data stream, wherein alternatively the following takes place: - if the comparison has a positive result: resetting of the interval to "1"; - if the comparison has a negative result: equating the current spreading code with the spreading code that stands at the position stipulated by the permutation function.
  • the loop describes here ensures that the received signal is respectively decoded with the same code that was used for encryption, and through this the digital data stream is recovered.
  • the device for carrying out a decoding method the task is solved in that the device has a second code generator that produces the current spreading code.
  • the current spreading code can be produced contemporaneously during decoding, or can be produced in advance and stored in a suitable memory.
  • a second code generator means that both the transmitting device and the receiving device have a code generator.
  • the code generator that is used during the k th connection as the second code generator, namely as the code generator for the decoding, can also be the first code generator used for the encryption during another connection.
  • the transmission system has a first device in which the digital data stream is mixed with a spreading code, and has a second device in which the received, encrypted signal and the spreading code are supplied to a correlator, and the transmission system has means for carrying out encryption, carrying out decoding of a digital data stream that was transmitted encrypted.
  • These means can be a clock generator, a memory (ROM) for storing the spreading code and the instructions which are communicated with the aid of the encryption key.
  • the method according to the invention for encrypting and decoding a digital data stream can be used in both cordless and line-based networks, wherein the level of the degree of encryption and thus the level of protection against unauthorized eavesdropping can be adapted to the respective requirement.
  • Advantages of the invention are that the degree of encryption is increased during data transmission, whilst the necessary bandwidth remains unchanged. This advantage is achieved through the fact that the encryption of the digitized data takes place in the physical layer (layer 1) of the OSI 7-layer model. In this connection, the degree of encryption stands for a level of complexity.
  • Fig. 1 shows schematically a CDMA transmitter according to the prior art
  • Fig. 2 shows schematically a CDMA receiver according to the prior art
  • Fig. 3 shows a device for encryption in accordance with the invention, in a schematic representation
  • Fig. 4 shows a device for decoding in accordance with the invention, in a schematic representation
  • Fig. 5 shows in a schematic representation a flow chart [for] a method in accordance with the invention, for encrypting a digital data stream
  • Fig. 6 shows schematically, in a flow chart, a method in accordance with the invention, for decoding and recovering a digital data stream
  • Fig. 7 contains a table with certain permutation functions.
  • Figure 1 shows schematically a transmitter for transmission with the CDMA method.
  • the digital data stream d 1 - - 1 of the k th connection is mixed with a spreading code c ⁇ .
  • the transmission signal s® that is created thus is sent to the receiving subscriber, either cordlessly or line-based.
  • the spreading code c® is constant for the duration of the connection.
  • An unauthorized receiver can intercept the transmission signal s ( ' and store it, and could determine, by trial and error, the single spreading code that was used.
  • Figure 2 shows schematically a CDMA receiver, which adds the coded input signal r ⁇ in a correlator to the same spreading code c ⁇ .
  • FIG. 3 shows, in a schematic representation, a device 1 in accordance with the invention, for encryption for the CDMA transmission system.
  • the digital data stream d w is mixed with a dynamic code c (k) (t) here.
  • a dynamic code generator 2 produces orthogonal codes of differing content, and controls their use, so that during a connection different spreading codes are used.
  • a quantity G of orthogonal codes ⁇ g ⁇ (k) , g 2 (k - ) ... g H W ⁇ is established.
  • the encryption varies, for example through the application of a first code cj®, a second code c 2 ⁇ etc.
  • a first degree of encryption is achieved.
  • Figure 4 shows, in a schematic representation, a device 3 in accordance with the invention, for decoding the received signal r® and for recovering the digital data stream y ( ' in a transmission system.
  • the received signal r w is supplied to a correlator just as the dynamic code c ⁇ t) is.
  • a dynamic second code generator 4 creates orthogonal codes of different content and controls their use, so that during a connection different spreading codes are applied.
  • the application of different spreading codes during a single connection is intended to be visualized through the illustration (t) and through the adjective "dynamic".
  • the dynamic code generator 2 for the transmission device 1 and the code generator 4 for the receiver device can be physically the same ones.
  • a mobile radio telephone has a part for transmitting and a part for receiving, wherein according to one embodiment of the invention, both make use of the same dynamic code generator.
  • Figure 5 schematically shows a method in accordance with the invention, for encrypting a digital data stream.
  • the encryption key is communicated. This triggers the following, in any order: the establishment of a permutation function S; 210; the establishment of a set of spreading codes G; 220; the establishment of a hop interval I op 230.
  • the encryption key is created by the transmitting unit and contains the parameters necessary for decoding the transmitted data signal.
  • the permutation function S; ⁇ _l, p_2 ...
  • p_M ⁇ indicates in which order the individual codes gi ⁇ , g 2 w ... gH W of the set Gj are applied.
  • the establishment 210 of the permutation function that is valid for the current transmission can alternatively take place through: a) communication of a vector S; which includes the concrete permutation sequence ⁇ p_l, p_2 ... p_M ⁇ , or b) communication only of the name of a single permutation function S;.
  • Alternative a) enables an unauthorized third party subscriber to eavesdrop the permutation sequence and thus to obtain an aid for decoding the digital data stream that has been transmitted.
  • this method has the advantage that storage space is saved on both the transmitter and receiver sides, since the permutation sequence that is valid for the current communication needs only to be stored in the buffer memory, and can be deleted after the ending of the transmission.
  • Alternative b) requires that on both the transmitter and receiver sides, all the possible permutation functions Si, S 2 ... S L (L: whole-number) have to be permanently stored, so that the permutation function S; that is valid for the transmission can be called up.
  • the advantage of this variant is that an unauthorized third party subscriber cannot find out the sequence of orthogonal codes G; that lies behind the permutation function S; that is used, since it is not communicated, wherein H and P are whole numbers.
  • a set G contains H individual orthogonal codes that are suitable for use in the CDMA method.
  • each individual one of the H orthogonal codes g is built up as a vector with P elements.
  • the step of establishing a set Gj of spreading codes 220 can alternatively take place either through c) Cornmu ication of the concrete individual orthogonal codes in the form of vectors or d) communication of the names of the orthogonal codes that are to be used.
  • Step 230 for establishing the hop interval Ih op , alternatively means either e) stipulation of a period Th op , i.e. of a time-related duration of validity, or f) stipulation of a quantity Q of data packets.
  • the first permutation procedure 400 is as follows: at step 410 the interval n is set to " 1 ", that orthogonal code from the set G; is used that stands at the place p_l of the permutation function Sj. At step 420, the expiry of the hop interval I hop is waited for. The measuring of time for establishing the end of the period, or the counting of the data packets that have been transmitted, takes place through corresponding devices such as for example a counter or a flip-flop. When the end of the hop interval Ih op has been reached, in step 430 the interval n is increased by the value 1. At step 440 the comparison is then carried out to see whether the current value for the interval n is greater than the total number M of the elements of the permutation vector.
  • step 450 that code is called up as a current code c n (k) which stands at the n h position p_n of the permutation function S;, i.e. c n (k) and it is used until, in the course of the loop, in step 420 the end of the hop interval Ihop is reached and subsequently in step 430 the interval n is increased by the value 1.
  • c n (k) which stands at the n h position p_n of the permutation function S;, i.e. c n (k) and it is used until, in the course of the loop, in step 420 the end of the hop interval Ihop is reached and subsequently in step 430 the interval n is increased by the value 1.
  • the encryption key which is corrimunicated in step 600, following on from the connection set-up 500, triggers the following: the establishment of a permutation function S; 610; the establishment of a set of spreading codes G; 620; - the establislrment of a hop interval I hop 630.
  • the establishment 610 of the permutation function that is valid for the current transmission can alternatively take place through either communication of a vector S; which contains the concrete permutation sequence ⁇ p_l, p_2 ...
  • the step for establishing a set G; of spreading codes 620 can take place alternatively either through communicating the concrete individual orthogonal codes in the form of vectors or communicating the names of the orthogonal codes that are to be used, and/or - the step 630 for establishing the hop interval I hop can alternatively mean the stipulation of either a period T hop , i.e. a time-related period of validity, or a quantity Q of data packets.
  • the first permutation procedure 800 is as follows: at step 810 the interval n is set to " 1 ", that orthogonal code from the set G; is used which stands at the place p_l of the permutation function S;. At step 820 the expiry of the hop interval I h0p is waited for. The measuring of time for determining the end of the period, or the counting of data packets that have been transmitted, is carried out by corresponding devices such as for example a counter or a flip-flop. Once the end of the hop interval I hop has been reached, in step 830 the interval n is increased by the value 1. At step 840 the comparison is then carried out to see whether the current value for the interval n is greater than the total number M of the elements of the permutation vector.
  • p_M ⁇ and the code c that follows from that.
  • p_l, p_2 ... p_M are any whole numbers 1, 2 ... H.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
EP04744711A 2003-08-13 2004-08-03 Verfahren und vorrichtung zum verschlüsseln eines digitalen datenstroms in einem übertragungssystem Withdrawn EP1656744A1 (de)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP04744711A EP1656744A1 (de) 2003-08-13 2004-08-03 Verfahren und vorrichtung zum verschlüsseln eines digitalen datenstroms in einem übertragungssystem

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP03102523 2003-08-13
EP04744711A EP1656744A1 (de) 2003-08-13 2004-08-03 Verfahren und vorrichtung zum verschlüsseln eines digitalen datenstroms in einem übertragungssystem
PCT/IB2004/051363 WO2005018103A1 (en) 2003-08-13 2004-08-03 Method and device for encrypting a digital data stream in a transmission system

Publications (1)

Publication Number Publication Date
EP1656744A1 true EP1656744A1 (de) 2006-05-17

Family

ID=34178562

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04744711A Withdrawn EP1656744A1 (de) 2003-08-13 2004-08-03 Verfahren und vorrichtung zum verschlüsseln eines digitalen datenstroms in einem übertragungssystem

Country Status (6)

Country Link
US (1) US20060215735A1 (de)
EP (1) EP1656744A1 (de)
JP (1) JP2007502566A (de)
KR (1) KR20060073596A (de)
CN (1) CN1836380A (de)
WO (1) WO2005018103A1 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005018185A1 (en) * 2003-08-13 2005-02-24 Philips Intellectual Property & Standards Gmbh Encryption method and decoding method for a digital transmission system
US7711035B2 (en) * 2004-09-17 2010-05-04 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for suppressing communication signal interference
KR100735125B1 (ko) 2005-05-19 2007-07-06 김창모 무선 콘텐츠 브로드 서비스 방법 및 시스템
US7711028B2 (en) * 2005-08-02 2010-05-04 The Mitre Corporation Spectrum shaping using code-hopping CDMA
US8526524B2 (en) * 2007-03-27 2013-09-03 Qualcomm Incorporation Orthogonal reference signal permutation
CN101294463B (zh) * 2008-06-18 2011-05-18 大连交通大学 基于电子密码锁的动态加密和开启方法
WO2019003321A1 (ja) * 2017-06-27 2019-01-03 三菱電機株式会社 符号生成装置、符号生成方法および符号生成プログラム

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3234538A1 (de) * 1982-09-17 1984-03-22 Siemens AG, 1000 Berlin und 8000 München Verfahren zur code-sicherung bei einem elektronischen schluessel
US5204874A (en) * 1991-08-28 1993-04-20 Motorola, Inc. Method and apparatus for using orthogonal coding in a communication system
US5210770A (en) * 1991-09-27 1993-05-11 Lockheed Missiles & Space Company, Inc. Multiple-signal spread-spectrum transceiver
US5394433A (en) * 1993-04-22 1995-02-28 International Business Machines Corporation Frequency hopping pattern assignment and control in multiple autonomous collocated radio networks
JPH07147553A (ja) * 1993-11-24 1995-06-06 Sanyo Electric Co Ltd 周波数ホッピング通信方法及びその装置
JP3202125B2 (ja) * 1994-03-10 2001-08-27 沖電気工業株式会社 符号分割多元接続システム
US5602833A (en) * 1994-12-19 1997-02-11 Qualcomm Incorporated Method and apparatus for using Walsh shift keying in a spread spectrum communication system
AU702129B2 (en) * 1995-01-20 1999-02-11 Ericsson Inc. Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics
US5727064A (en) * 1995-07-03 1998-03-10 Lucent Technologies Inc. Cryptographic system for wireless communications
US6330333B1 (en) * 1995-07-03 2001-12-11 Lucent Technologies, Inc. Cryptographic system for wireless communications
US6356555B1 (en) * 1995-08-25 2002-03-12 Terayon Communications Systems, Inc. Apparatus and method for digital data transmission using orthogonal codes
US6049289A (en) * 1996-09-06 2000-04-11 Overhead Door Corporation Remote controlled garage door opening system
US6359923B1 (en) * 1997-12-18 2002-03-19 At&T Wireless Services, Inc. Highly bandwidth efficient communications
US6539050B1 (en) * 1997-06-26 2003-03-25 Hughes Electronics Corporation Method for transmitting wideband signals via a communication system adapted for narrow-band signal transmission
KR100264862B1 (ko) * 1997-07-31 2000-09-01 윤종용 대역확산에따른직교부호도약다중접속방식통신시스템의송수신장치및그방법
JPH11145933A (ja) * 1997-11-12 1999-05-28 Oki Electric Ind Co Ltd スペクトラム拡散通信方式及び装置
KR100755038B1 (ko) * 1999-08-05 2007-09-06 한국전자통신연구원 직교 부호 도약 다중화 통신 방식 및 장치
KR100354337B1 (ko) * 1999-12-04 2002-09-28 한국과학기술원 대역 확산 통신 방식에서의 확산 변조 방식을 이용한송수신방식 및 송수신장치
JP2001223670A (ja) * 2000-02-09 2001-08-17 Nec Corp 拡散符号生成器及びそれを用いるcdma通信装置並びにそれらに用いる拡散符号生成方法
FR2807243B1 (fr) * 2000-03-30 2003-01-24 Mitsubishi Electric France Procede de modulation par etalement de spectre a code d'etalement discontinu, procede de demodulation, station mobile et stations de base correspondants
KR100370746B1 (ko) * 2000-05-30 2003-02-05 한국전자통신연구원 다차원 직교 자원 도약 다중화 통신 방식 및 장치
JP2002084257A (ja) * 2000-07-05 2002-03-22 Sanyo Electric Co Ltd 直交符号生成装置、スクランブル符号生成装置、およびそれらを用いた携帯無線端末
US7099372B2 (en) * 2000-10-27 2006-08-29 L-3 Communications Corporation Spreading code hopping for synchronous DS-CDMA system to mitigate interference effects
JP2003060557A (ja) * 2001-08-10 2003-02-28 Fujitsu Ltd アレーアンテナシステムを有する基地局
US20030081538A1 (en) * 2001-10-18 2003-05-01 Walton Jay R. Multiple-access hybrid OFDM-CDMA system
US7333614B2 (en) * 2001-11-16 2008-02-19 Qualcomm Incorporated System and method for encypting spread spectrum carrier

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2005018103A1 *

Also Published As

Publication number Publication date
WO2005018103A1 (en) 2005-02-24
US20060215735A1 (en) 2006-09-28
JP2007502566A (ja) 2007-02-08
CN1836380A (zh) 2006-09-20
KR20060073596A (ko) 2006-06-28

Similar Documents

Publication Publication Date Title
CN101908908B (zh) 用于在多址通信网络中进行灵活跳变的方法和装置
KR20000067868A (ko) 단거리 무선통신시스템과 이의 사용법
JP2002185428A (ja) 直交周波数分割多重化(ofdm)通信受信器のタイミング同期
CN101047402B (zh) 通信控制方法/系统
US20060280228A1 (en) Data transmission using repeated sets of spreading sequences
WO1998017028A1 (en) Use of duplex cipher algorithms for satellite channels with delay
WO2019154447A1 (en) Wireless communications system employing continuous phase modulation and physical layer security primitives
WO2004070992A2 (en) Data channel procedure for systems employing frequency diversity
WO2005018103A1 (en) Method and device for encrypting a digital data stream in a transmission system
CN108124310B (zh) 一种跳频通信方法及其设备
US7054346B2 (en) Enhanced frequency hopping in a wireless system
JP2007502568A (ja) デジタル伝送システムに対する暗号化方法及び復号方法
CN105337697A (zh) 一种适用于配网自动化的电力无线通信方法、装置及系统
Chao et al. A flexible anti-jamming channel hopping for cognitive radio networks
US6501841B1 (en) Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels
CN101296052B (zh) 一种抗通信侦察与截获的方法与装置
JP3898138B2 (ja) 送信機及び受信機
EP2985944A1 (de) System und verfahren zur verbesserung der interferenzrobustheit in einem telekommunikationsnetz
CN101043232B (zh) 扰乱拉丁方序列产生方法及装置和通信控制方法及系统
CN102065034B (zh) 时延多址系统及其时延多址接入方法
Lindgren Physical Layer Simulations of the IEEE 802.11 b Wireless LAN-standard
EP1627490B1 (de) Prozessor und verfahren für end-to-end-verschlüsselungssynchronisation
Trabelsi et al. A reduced complexity DS-CDMA system for personal communication networks
Datar WiFi and WiMax: break through in wireless access technologies
Kiresur et al. Reconfigurable software defined radio modem for Personal Area Network

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060313

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: KONINKLIJKE PHILIPS ELECTRONICS N.V.

Owner name: PHILIPS INTELLECTUAL PROPERTY & STANDARDS GMBH

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20111228